scorecardThere's no such thing as a phone that 'cannot be hacked' - the rich and powerful use the same phones as anyone else, and they're just as vulnerable
  1. Home
  2. slideshows
  3. miscellaneous
  4. There's no such thing as a phone that 'cannot be hacked' - the rich and powerful use the same phones as anyone else, and they're just as vulnerable

There's no such thing as a phone that 'cannot be hacked' - the rich and powerful use the same phones as anyone else, and they're just as vulnerable

No Gmail, no App Store — using an ultra-secure smartphone is like 'taking a step back into the 1990s'

There's no such thing as a phone that 'cannot be hacked' - the rich and powerful use the same phones as anyone else, and they're just as vulnerable

Challenging the giants

Challenging the giants

Weaver's goal with the Librem 5 isn't necessarily to appeal to everyone; it's to challenge the dominance of large firms like Apple, Google, and Facebook, all of which have come under increased scrutiny in the past year over the power and influence they hold in the industry, as well as the ways they handle consumer data.

"It always comes down to control," Weaver said. "To break up that [iOS and Android] duopoly ... you have to give control to the individual."

His company's audience, he said, is a combination of parents looking for a privacy-oriented device for their child, software developers, C-suite executives, and enterprise clients. But incidents like the Jeff Bezos hack or the Equifax data breach from 2017 usually lead to a spike in traffic to Purism's website and a bump in sales. Rogers also said that after the Bezos hack, two venture capitalists reached out to him asking about the possibility of building a secure phone.

But even beyond the limitations that come with a privacy-oriented phone, it's difficult for any newcomer to challenge a smartphone market that's dominated largely by Samsung, Apple, and Chinese tech giant Huawei. Apple and Samsung each claimed 18% of the market share in the fourth quarter of 2019, according to Counterpoint Research, while Huawei claimed 14%, Xiaomi, Vivo, and Oppo each claimed 8% and Lenovo claimed 3%. No other smartphone maker accounted for a significant enough share of the market to break out in Counterpoint's analysis.

"Short of government regulation that reshapes the market, it seems really unlikely and difficult in this market for a challenger to build any kind of scale business other than a really expensive niche device," said Frank Gillett, a vice president and principal analyst for research firm Forrester who follows the technology industry and mobile device market.

What the rich and powerful do to protect their phones instead

What the rich and powerful do to protect their phones instead

Embracing a specialized device like the Librem 5 or other similar products may not be the right choice for most people, including billionaires like Bezos, who reportedly uses an iPhone X.

A more likely solution, particularly for high-net-worth individuals, is to carry a temporary burner phone while traveling, rather than using your primary smartphone that houses all of your sensitive data, according to Mike White, senior vice president and practice lead for security firm Hillard Heintze's private client and family offices division.

White also said he suggests that his clients use the phone of someone else that wouldn't be as high-profile or public-facing, like an assistant, to conduct extra sensitive communications.

While his clients haven't expressed much interest in ultra-secure devices like the Librem 5 or Communitake IntactPhone, he has recommended using a satellite phone in some circumstances for those looking for enhanced security while traveling to remote locations. Even so, the satellite phone is usually meant to serve as an alternative to their primary phone, not a replacement.

But above all else, being cautious about opening unknown files and sharing personal information are among the most effective ways for anyone to protect their smartphone, public figure or not. After all, the Bezos attack came from a video file that was shared through social media, and Corcoran was almost scammed out of hundreds of thousands of dollars because a thief was able to spoof her assistant's email address.

"There's a certain degree of human error, if you will," said White. "You could make the most secure device in the world, but if the device allows you to download that attachment and that attachment has malware, you're going to be infected."

Some of the best measures anyone can take on a daily basis, says White, is to practice strong password management and keeping apps and software up to date. That's because while some people may be willing to compromise on having a phone that has the latest hardware and apps for enhanced privacy protections, the vast majority likely won't.

"There's an interesting analogy you can use," says Gillett. "If you substituted 'phone' for 'automobile,' the question would be, would we all ride around in armored vehicles?"

Advertisement